Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

From eavesdropping to security on the cellular telephone system GSM

From eavesdropping to security on the cellular telephone system GSM Nowadays, mobile cellular communications concern multi-millions of people , many enterprises and national interests. Because of the few illegal interceptions, by habit or by belief, the majority of users have an angelic confidence in the privacy of their conversations. Nevertheless, a doubt subsists when the news unveils the existence of unfair, excessive or uncontrolled interceptions. Meanwhile, legislation is evolving and the technology is capable of protecting personal and sensitive information. What are the judicial and investigative tools for legal surveillance, that are apt to guarantee the ordinary citizen or an enterprise against assault? What is behind the mobile GSM telephone on this subject? http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

From eavesdropping to security on the cellular telephone system GSM

ACM SIGSAC Review , Volume 15 (2) – Apr 1, 1997

Loading next page...
 
/lp/association-for-computing-machinery/from-eavesdropping-to-security-on-the-cellular-telephone-system-gsm-ov0nrFX21Z
Publisher
Association for Computing Machinery
Copyright
Copyright © 1997 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/254594.254598
Publisher site
See Article on Publisher Site

Abstract

Nowadays, mobile cellular communications concern multi-millions of people , many enterprises and national interests. Because of the few illegal interceptions, by habit or by belief, the majority of users have an angelic confidence in the privacy of their conversations. Nevertheless, a doubt subsists when the news unveils the existence of unfair, excessive or uncontrolled interceptions. Meanwhile, legislation is evolving and the technology is capable of protecting personal and sensitive information. What are the judicial and investigative tools for legal surveillance, that are apt to guarantee the ordinary citizen or an enterprise against assault? What is behind the mobile GSM telephone on this subject?

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Apr 1, 1997

There are no references for this article.